CN110378145A - A kind of method and electronic equipment of sharing contents - Google Patents
A kind of method and electronic equipment of sharing contents Download PDFInfo
- Publication number
- CN110378145A CN110378145A CN201910498149.XA CN201910498149A CN110378145A CN 110378145 A CN110378145 A CN 110378145A CN 201910498149 A CN201910498149 A CN 201910498149A CN 110378145 A CN110378145 A CN 110378145A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- content
- data
- image data
- sensitive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0483—Interaction with page-structured environments, e.g. book metaphor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04845—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/60—Editing figures and text; Combining figures or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T15/00—3D [Three Dimensional] image rendering
- G06T15/005—General purpose rendering architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2200/00—Indexing scheme for image data processing or generation, in general
- G06T2200/24—Indexing scheme for image data processing or generation, in general involving graphical user interfaces [GUIs]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Graphics (AREA)
- Automation & Control Theory (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A kind of method and electronic equipment of sharing contents.This method comprises: the first electronic equipment is in the scene for sharing screen to the second electronic equipment, obtain the drawing data of first content to be drawn, drawing data based on first content, draws control layer, application layer, the corresponding content of system layer respectively, and synthesis obtains the image data of first content;It identifies control layer, application layer and the corresponding sensitive data of system layer in the drawing data of first content, and drawing data after desensitization process is handled is carried out to sensitive data;Based on drawing data after processing, control layer, application layer, the corresponding content of system layer are drawn respectively, and synthesis obtains the image data of the second content;First content is shown according to the image data of first content, and the image data of the second content is sent to the second electronic equipment.Sensitive data, and desensitization process can be more thoroughly identified from three control layer, application layer and system layer levels in this method, and the safety of sharing contents can be improved.
Description
Technical field
This application involves the methods and electronic equipment of security technology area more particularly to a kind of sharing contents.
Background technique
As the function of electronic equipment is more and more abundant, more and more users are carried out by electronic equipment to other users
Sharing contents, such as the user of electronic equipment A are realized by way of mirror image screen sharing on electronic equipment B sharing screen
Hold, this mirror image screen, which shares mode, to be shown in all display contents on electronic equipment A on electronic equipment B, in this way
The user for electronic equipment A inevitably occur, which is not intended to share to the privacy content of electronic equipment B, is also shown in electronic equipment B
On, cause user's sensitive data of electronic equipment A to reveal.And current screen shares scheme, electronic equipment A is to electronic equipment B
It before sharing contents, identifies sensitive application and the privacy information of sensitive application is handled, there are also in some schemes, sharing
The bullet frame that control is related to sensitive data in the process is not shown on electronic equipment A, then by image file after treatment point
Electron equipment B is enjoyed, identification sensitive data is not thorough enough in currently existing scheme, so the safety of sharing contents is to be improved.
Summary of the invention
The embodiment of the present application provides the method and electronic equipment of a kind of sharing contents, to realize the scene shared in screen
In, improve the safety of sharing contents.
First aspect provides a kind of method of sharing contents, can be applied to first electronic equipment with display screen,
First electronic equipment detect for the second electronic equipment share screen first operation, in response to first operation, establish with
Communication connection between second electronic equipment.Then, the first electronic equipment obtains the drawing data of first content to be drawn,
In, drawing data includes control layer, application layer, the position of the corresponding view of system layer, size, shows content, display properties, the
Drawing data of one electronic equipment based on first content draws control layer, application layer, the corresponding content of system layer, synthesis respectively
Obtain the image data of first content.First electronic equipment identify first content drawing data in control layer, application layer, with
And the corresponding sensitive data of system layer, and drawing data after desensitization process is handled is carried out to sensitive data, and later, the first electricity
Sub- equipment is based on drawing data after processing, draws control layer, application layer, the corresponding content of system layer respectively, and synthesis obtains second
The image data of content.First electronic equipment shows first content according to the image data of first content on a display screen, and to
Second electronic equipment sends the image data of the second content.
With this solution, on the one hand, the first electronic equipment is being drawn for before being shared with the content of the second electronic equipment,
From three hierarch recognition sensitive datas such as control layer, application layer and system layer, compared to the prior art in individually from application layer
The scheme of identification sensitive data is gone, the application can more thoroughly identify sensitive data, share so as to improve in screen
The safety of sharing contents in scene.On the other hand, the application first identifies in be drawn first before drawing image data
Hold for drawing data in sensitive data, and carry out desensitization process, compared to the prior art in being obtained after drafting
Image data identifies that the scheme of sensitive data, the application are improving the safety of screen content sharing in screen sharing scene
Meanwhile the processing time of sharing contents process can be saved.
Wherein, desensitization process can be, but not limited to include any one of following or multinomial: scratch except processing;Block processing;It hides
Processing;Replace contents processing;Virtualization processing or mosaic processing.
In one possible implementation, the first electronic equipment can carry out at image the image data of the second content
Reason, image data after being handled, then, image data after being handled to the second electronic equipment transmission.Wherein, image procossing can be with
Identification first area is specifically included, and scratches the data except first area, the character format of the corresponding content of the data of first area
It is matched with the character format of default privacy information.
With this solution, the first electronic equipment can be after the image data for obtaining the second content, can also be further
Image data after image procossing is handled is carried out to the image data of the second content, so as to accurately identify sensitive data,
It can be further improved and share the safety of sharing contents in scene in screen.Moreover, being identified by identification string format
The sensitive data in one region, for the particular content for identifying the region, processing speed is faster.
In one possible implementation, the concrete mode of the first electronic equipment identification first area can be with are as follows: uses
Artificial intelligence AI security model identifies the first area in the image data of the second content, wherein AI security model is according to tool
There are the picture of privacy information label and the picture with normal tag to be trained.
In one possible implementation, above-mentioned image procossing can also include: the stingy first area except data into
Row rendering processing.
With this solution, rendering processing is carried out to first area, may make according to after processing image data show when, display
Content after having rendering is avoided due to scratching except the case where blank screen is presented in caused first area is handled, so as to promote user
Experience.
In one possible implementation, the drawing data of a kind of first electronic equipment identification first content presented below
In control layer, application layer and the corresponding sensitive data of system layer specific implementation: identify the drafting number of first content
Security sensitive application in, security sensitive apply the application of the name-matches for Apply Names and the application of default security sensitive;
Identify the security sensitive control in the drawing data of first content, security sensitive control is that the value of security attribute information is preset value
Control, alternatively, security sensitive control is control with the name-matches of default security sensitive control;Identification first content is drawn
System sensitive behavior in data processed;System sensitive behavior is matched with default sensitive behavior.Then, to the drafting number of first content
Security sensitive in applies corresponding data, the corresponding data of security sensitive control and the corresponding data of system sensitive behavior
Carry out desensitization process, drawing data after being handled.
With this solution, application layer, control layer, the sensitive data in system layer can accurately be identified.
Second aspect provides a kind of method of sharing contents, can be applied to second electronic equipment with display screen.
When receiving the request of the sharing screen from first electronic equipment, the second electronic equipment is established and first electronics
Communication connection between equipment, then, the second electronic equipment can receive image data after the processing from the first electronic equipment,
Image data includes the stingy first area except data after processing, later, is carried out to the first area in image data after processing
Rendering processing, and according to by rendering, treated that image data shows the second content on a display screen.
With this solution, image data includes the stingy first area except data after the processing that the first electronic equipment is sent,
First electronic equipment does not render first area, but carries out rendering processing by the second electronic equipment, compared to first
Electronic equipment is sent to the second electronic equipment by rendering treated image data, and the program can reduce the first electronic equipment
The data volume of data is sent to the second electronic equipment.
The third aspect provides the graphic user interface GUI in a kind of electronic equipment, which has display screen, storage
Device, one or more processors, one or more of processors are stored in one or more of the memory for executing
Computer program, the graphic user interface may include: that the above-mentioned first aspect of electronic equipment execution and first aspect are any
Method in possible implementation, or the graphic user interface shown when the execution such as method of above-mentioned second aspect offer.
Fourth aspect provides a kind of electronic equipment, including processor and memory;Memory is stored with one or more meters
Calculation machine program;When one or more computer programs of memory storage are executed by processor, electronic equipment is held
The row such as method in above-mentioned first aspect and any possible implementation of first aspect, or execute as above-mentioned second aspect mentions
The method of confession.
It should be noted that the memory can integrate in processor, it is also possible to independently of except processor.
5th aspect provides a kind of computer readable storage medium, which has computer journey
Sequence, when computer program is run on an electronic device, so that electronic equipment executes such as above-mentioned first aspect and first aspect
Method in any possible implementation, or the method provided such as above-mentioned second aspect is provided.
6th aspect a kind of computer program product comprising instruction is provided, when computer program product on an electronic device
When operation, so that electronic equipment executes the method in such as above-mentioned first aspect and any possible implementation of first aspect,
Or execute the method provided such as above-mentioned second aspect.
In addition, technical effect brought by second aspect to the 6th any possible implementation of aspect can be found in first
Technical effect brought by different implementations in aspect, details are not described herein again.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 2 is the schematic diagram of a graphic user interface on the display screen of electronic equipment provided by the embodiments of the present application;
Fig. 3 A is a kind of structural schematic diagram of software program provided by the embodiments of the present application;
Fig. 3 B is the structural schematic diagram of another software program provided by the embodiments of the present application;
Fig. 4 is a kind of sharing contents process schematic provided by the embodiments of the present application;
Fig. 5 A is the graphic user interface schematic diagram that a kind of triggering screen provided by the embodiments of the present application is shared;
Fig. 5 B is the graphic user interface schematic diagram that another triggering screen provided by the embodiments of the present application is shared;
Fig. 6 is display system hierarchical diagram provided by the embodiments of the present application;
Fig. 7 A is the schematic diagram of a graphic user interface provided by the embodiments of the present application;
Fig. 7 B is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 C is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 D is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 E is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 7 F is the schematic diagram of another graphic user interface provided by the embodiments of the present application;
Fig. 8 is the study and foundation of AI model provided by the embodiments of the present application and the flow diagram used;
Fig. 9 is a kind of method flow schematic diagram of sharing contents provided by the embodiments of the present application.
Specific embodiment
In order to keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application make into
One step it is described in detail.Concrete operation method in embodiment of the method also can be applied to Installation practice or system embodiment
In.Wherein, in the description of the present application, unless otherwise indicated, the meaning of " plurality " is two or more.
It should be noted that the terms "and/or", only a kind of incidence relation for describing affiliated partner, is indicated
There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three
Situation.In addition, character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or" unless otherwise specified herein.And
In the description of the embodiment of the present application, the vocabulary such as " first ", " second " are only used for distinguishing the purpose of description, and should not be understood as
Indication or suggestion relative importance can not be interpreted as indication or suggestion sequence.
Electronic equipment introduced below, graphic user interface (the graphical user for such electronic equipment
Interface, GUI) and embodiment for using such electronic equipment.In some embodiments of the application, electronic equipment
It can be mobile phone, tablet computer, notebook computer or the wearable device (such as smartwatch or intelligence that have wireless communication function
Energy glasses etc.) etc..The electronic equipment includes device (such as the processor, or, at application that can run drawing image data capability
Device is managed, or, image processor, or, other processors), and it is capable of the device (such as display screen) of display image data.The electricity
The exemplary embodiment of sub- equipment includes but is not limited to carryOr other operation systems
The equipment of system.Above-mentioned electronic equipment is also possible to other portable devices, as long as the portable device may be implemented to identify wait draw
Sensitive data in the content of system carries out desensitization process and drawing image data to sensitive data, and shares to other equipment
Image data.It is to be further understood that above-mentioned electronic equipment may not be just in some other embodiment of the application
Portable device, and can be achieved on the sensitive data identified in content to be drawn, to sensitive data carry out desensitization process and
Drawing image data, and to other equipment share image data desktop computer.
This application involves first content and the second content can be the contents of the forms such as picture, video or text, after
Text is not repeating.
Certainly, in other embodiments of the application, electronic equipment, which also may not need to have, identifies content to be drawn
In sensitive data, the abilities of desensitization process and drawing image data is carried out to sensitive data, it is only necessary to there is display image
The ability of data.For example electronic equipment can receive the image data that other equipment are sent, and then show the image data.
Hereinafter, the application with the first electronic equipment be with the sensitive data identified in content to be drawn, to sensitive data into
Row desensitization process and drawing image data function, and have the function of to be said for sharing image data to other equipment
Bright, the second electronic equipment is illustrated at least having the function of display image data.
It should be noted that in the embodiment of the present application by the first electronic equipment to for the second electronic equipment sharing contents into
Row explanation, it should be appreciated that it is same to a number of other electronic equipments that scheme provided by the embodiments of the present application is also applied for the first electronic equipment
When sharing contents scene, for example the first electronic equipment is simultaneously to the second electronic equipment, third electronic equipment and the 4th electronics
Equipment shares screen, and the first electronic equipment can refer to the first electronic equipment to the scheme of each other electronic equipment sharing contents
To the scheme of the second electronic equipment sharing contents.
With reference to the accompanying drawing, the structure of above-mentioned electronic equipment is further illustrated.
The hardware structural diagram of electronic equipment 100 may refer to shown in Fig. 1, and Fig. 1 illustrates only the embodiment of the present application and mentions
The hardware structural diagram of a kind of electronic equipment of confession on the basis of shown in Fig. 1, can also have other modification structures modes to deposit
?.As shown in Figure 1, electronic equipment 100 may include processor 110, external memory interface 120, internal storage 121 leads to
With universal serial bus (universal serial bus, USB) interface 130, charge management module 140, power management module 141,
Battery 142, antenna 1, antenna 2, mobile communication module 151, wireless communication module 152, audio-frequency module 191 (including loudspeaker, by
Device is talked about, microphone, earphone interface etc. is not shown in Fig. 1), sensor module 180, key 190, display screen 194 and user
Mark module (subscriber identification module, SIM) card interface 195 etc..Wherein sensor module 180 can
To include pressure sensor 180A, range sensor 180F, close to optical sensor 180G, fingerprint sensor 180H, touch sensing
(electronic equipment 100 may also include other sensors such as temperature sensor, ambient light sensor, gyro sensors to device 180K etc.
Device etc., is not shown in Fig. 1).
It is understood that the structure of the embodiment of the present application signal does not constitute the specific restriction to electronic equipment 100.?
In other embodiments of the application, electronic equipment 100 may include than more or fewer components shown in Fig. 1, or
Certain components are combined, certain components or different component layouts are perhaps split.Component shown in FIG. 1 can be with hardware, soft
The combination of part or software and hardware is realized.
The component having below to electronic equipment 100 shown in fig. 1 describes in detail.
Processor 110 may include one or more processing units, for example, processor 110 may include application processor
(application processor, AP), modem processor, graphics processor (graphics processing
Unit, GPU), image-signal processor (image signal processor, ISP), controller, memory, coding and decoding video
Device, digital signal processor (digital signal processor, DSP), baseband processor and/or Processing with Neural Network
Device (neural-network processing unit, NPU) etc..Wherein, different processing units can be independent device,
Also it can integrate in one or more processors.Wherein, controller can be in the nerve center and commander of electronic equipment 100
The heart.Controller can generate operating control signal according to instruction operation code and clock signal, complete instruction fetch and execute instruction
Control.
Memory can also be set in processor 110, for storing instruction and data.In some embodiments, processor
Memory in 110 is cache memory.The memory can save the instruction that processor 110 is just used or is recycled
Or data.If processor 110 needs to reuse the instruction or data, can be called directly from the memory, so as to
Repeated access is avoided, the waiting time of processor 110 can be reduced, thus the efficiency of system can be improved.
Below with reference to this application involves screen share scene, illustratively can to the processor 110 in electronic equipment 100
The function of execution is introduced.
In the scene that electronic equipment 100 shares screen to electronic equipment 200, i.e., electronic equipment 100 is to share equipment, electricity
Sub- equipment 200 is receiving device.Electronic equipment 100 is corresponding the first electronic equipment hereinafter, under electronic equipment 200 corresponds to
The second electronic equipment in text.
Electronic equipment 100 is showing that the main interface as shown in 2a in Fig. 2, main interface may include status bar 210, can hide
Navigation bar 220, time and weather widgets (widget) 230 and the icon 240 of various applications, such as picture library 241, electricity
Sub- the mail icon, short message icon, browser icon, wechat icon, setting icon etc..It include name of operator in status bar 210
Title (such as China Mobile), mobile network (such as 4G), time and remaining capacity etc..It may include retreating in navigation bar 220
(back) key icon, main screen (home) key icon and advance key icon.At this point, electronic equipment 200 is also shown such as 2a institute in Fig. 2
The main interface shown.
When electronic equipment 100 receives wechat message, middle 2b, the display screen 194 of electronic equipment 100 are shown referring to fig. 2
Notice plays frame 250, and the wechat message " weekend watches movie together " that Jacky is sent is shown in the notice bullet frame 250, electronics is set
The wechat message is privacy information for standby 100 user, and the user of electronic equipment 100 is not intended to the use of electronic equipment 200
The privacy information (i.e. notice plays the wechat message in frame 250) is seen at family, so the processor 110 of electronic equipment 100 can be drawn
Two parts of different image datas are made, a copy of it image data (the referred to as image data of first content) is used in electronic equipment
Show that content all in 2b in such as Fig. 2, another image data (the referred to as image data of the second content) are used in electricity on 100
Sub- equipment 200 shows the content in Fig. 2 in 2b in addition to notice plays frame 250, and the user of such electronic equipment 200 would not see
The content of the notice bullet frame 250, so as to avoid electronic equipment 100 privacy information leakage.
The process that processor 110 draws the image data of first content is described below.
The drawing data of the available first content to be drawn of processor 110, and according to the drawing data of first content
The image data of first content is drawn, then first content can be shown according to the image data of first content.Wherein, in first
The drawing data of appearance may include position, size, display content, display properties of the corresponding view of each layer etc., wherein in display
Holding to be text, picture, the background etc. in view, and display properties may include layout type, alignment thereof, display mode
(for example hide, is visible), display effect (such as display font, font size, picture transparency etc.), application message, safety control
Part attribute etc..
Illustratively, first content is all the elements on the interface as shown in 2b in Fig. 2, the drawing data of first content
Position, size, display content and display properties including the corresponding view of each level such as control layer, application layer, system layer.
As shown in 2b in Fig. 2, the corresponding view of control layer include various applications icon 240 and the time and weather it is small
Component (widget) 230.The corresponding view of application layer includes the background in main interface.The corresponding view of system layer includes status bar
210, suppressible navigation bar 220 and notice play frame 250.Processor 110 can draw control layer, application layer, system respectively
The corresponding content of layer, does not limit drawing order herein, that is to say, that can according to control layer, application layer, the sequence of system layer according to
Secondary drafting can also be drawn in another order.Then, processor 110 will draw obtained control layer, application layer, system
The corresponding content of layer is synthesized, and the image data of first content is obtained.Wherein, first content image data is such as 2b in Fig. 2
Shown in the corresponding all pixels point of content rgb value.
Processor 110 can also control display screen and show first content according to the image data of first content.
The process that processor 110 draws the image data of the second content is described below.
Processor 110 can also identify that control layer, application layer and system layer in the drawing data of first content are corresponding
Sensitive data, specific identification method may refer to introduction hereinafter, and details are not described herein again.
Illustratively, the content as shown in 2b in Fig. 2 identifies that sensitive data plays frame 250 for notice, then processor
110 can also be to the progress desensitization process of the sensitive data in the drawing data in first content, drawing data after being handled,
In, desensitization process can for sensitive data scratch remove, replace, block, hide, blur, mosaic etc. is any or appoints multinomial
Processing.Illustratively, the content that can be played in frame 250 to notice carries out desensitization process, and then, processor 110 can be based on processing
Drawing data afterwards draws control layer, application layer, the corresponding content of system layer respectively, does not limit drawing order herein, that is,
It says, can successively draw, can also be drawn in another order according to control layer, application layer, the sequence of system layer.Then,
Processor 110 synthesizes the control layer that drafting obtains, application layer, the corresponding content of system layer, obtains the figure of the second content
As data.Wherein, the image data of the second content be the content such as 2b in Fig. 2 shown in except notice bullet frame 250 in addition to content pair
The rgb value for all pixels point answered.
Processor 110 can also control the picture number that wireless communication module 152 sends the second content to electronic equipment 200
According to.
Correspondingly, electronic equipment 200 receive electronic equipment 100 transmission the second content image data after, according to
The image data of second content shows the second content.
Optionally, the safeties of sharing contents is improved in scene further to share in screen, processor 110 can also be
After drafting obtains the image data of the second content, the security sensitive content in the image data of the second content is carried out at image
Reason, image data after being handled.Including the data of each control region in the image data of the second content, wherein
Image procossing specifically: the first area in the image data of the second content of identification, the image data of first area are corresponding aobvious
Show that the character format of content is matched with the character format of default privacy information, illustratively, the image of the second content can be traversed
The data of the data of each control region in data, each control region may include the display content in the region,
Identify the region of the matched display content of the character format of character format and default privacy information, as first area, then
Scratch the data of the first area in the image data except the second content.
Processor 110 such as can also be encoded to image data after processing, be encrypted at the processing, be then forwarded to electronics later and set
Standby 200.
Internal storage 121 can be used for storing computer executable program code, and the executable program code includes
Instruction.Processor 110 is stored in the instruction of internal storage 121 by operation or execution, thereby executing each of electronic equipment 100
Kind functional application and data processing.Internal storage 121 may include storing program area and storage data area.Wherein, it stores
It program area can application program needed for storage program area, at least one function (such as sound-playing function, image player function
Deng) etc..Storage data area can store created in 100 use process of electronic equipment data (such as audio data, phone directory,
Webpage, image data etc.) etc..In addition, internal storage 121 may include high-speed random access memory, can also wrap
Include nonvolatile storage, such as disk memory, flush memory device or other non-volatile solid state memory parts etc..Storage inside
Device 121 can also store various operating systems, such as Apple Inc. is developedOperating system, Google are developed
'sOperating system etc..
Internal storage 121 can be also used for storing the program code of sharing contents algorithm provided by the embodiments of the present application.
When processor 110 accesses and runs the program code of sharing contents algorithm, the display screen in electronic equipment 100 may be implemented
First content is shown on 194, shares the second content to the second electronic equipment, i.e. it does not include sensitivity that the second content, which is in first content,
The content of data.Wherein, internal storage 121 may include high-speed random access memory, can also include non-volatile deposit
Reservoir, for example, at least a disk memory, flush memory device, generic flash memory (universal flash
Storage, UFS) etc..
The function of sensor module 180 is described below.
Touch sensor 180K, also referred to as " touch panel ".Touch sensor 180K can be set under display screen 194
Side forms touch screen by touch sensor 180K and display screen 194, also referred to as " touch screen ".Touch sensor 180K is for detecting
It is applied to it or neighbouring touch operation.The touch operation that touch sensor 180K can will test is passed to using processing
Device, to determine touch event type.Visual output relevant to touch operation can be provided by display screen 194.At other
In embodiment, touch sensor 180K also be can be set in the surface of electronic equipment 100, not with 194 location of display screen
Together.
For example, touch sensor 180K detects that touch on the image is grasped when display screen 194 shows an image
After making (such as clicking operation), which is sent to processor 110, processor 110 determines that the touch operation is corresponding
Position coordinates (for example touch screen, when being capacitive touch screen, processor 110 determines that the touch operation is corresponding based on capacitance variations
Coordinate position), i.e., user clicks the position coordinates on display screen, the figure that the corresponding object of the position coordinates, that is, user clicks
As upper object is (alternatively, touch sensor 180K itself can determine the corresponding coordinate position of touch operation, by the touch operation
Occur with the coordinate position to processor 110, processor 110 no longer needs to determine the corresponding coordinate position of touch operation).
Display screen 194 can be used for showing information input by user or be supplied to user information and various graphical users
Interface, for example, photo, video, webpage or file etc. can be shown.Display screen 194 includes display panel.Display panel can
To use liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode (organic light-
Emitting diode, OLED), active matrix organic light-emitting diode or active-matrix organic light emitting diode (active-
Matrix organic light emitting diode's, AMOLED), Flexible light-emitting diodes (flex light-
Emitting diode, FLED), Miniled, MicroLed, Micro-oLed, light emitting diode with quantum dots (quantum dot
Light emitting diodes, QLED) etc..In some embodiments, electronic equipment 100 may include 1 or N number of display
Shielding 194, N is the positive integer greater than 1.
In addition, electronic equipment 100 can by audio-frequency module 191 (loudspeaker, receiver, microphone, earphone interface), with
And processor 110 etc. realizes audio-frequency function.Such as music, recording etc..Wherein, the sound that audio-frequency module 191 can will receive
Electric signal after frequency data conversion, is transferred to loudspeaker, is converted to voice signal output by loudspeaker;On the other hand, microphone
The voice signal of collection is converted into electric signal, audio data is converted to after being received by audio-frequency module, then audio data is exported
To wireless communication module 152 to be sent to a such as terminal, or by audio data export to internal storage 121 so as into
The processing of one step.
The wireless communication function of electronic equipment 100 can pass through antenna 1, antenna 2, mobile communication module 151, wireless communication
Module 152, modem processor and baseband processor etc. are realized.
Antenna 1 and antenna 2 electromagnetic wave signal for transmitting and receiving.Each antenna in electronic equipment 100 can be used for covering
Cover single or multiple communication bands.Different antennas can also be multiplexed, to improve the utilization rate of antenna.Such as: it can be by antenna 1
It is multiplexed with the diversity antenna of WLAN.In other embodiments, antenna can be used in combination with tuning switch.
Mobile communication module 151, which can provide, applies wirelessly communicating on electronic equipment 100 including 2G/3G/4G/5G etc.
Solution.Mobile communication module 151 may include at least one filter, switch, power amplifier, low-noise amplifier
(low noise amplifier, LNA) etc..Mobile communication module 151 can receive electromagnetic wave by antenna 1, and to received electricity
Magnetic wave is filtered, and the processing such as amplification is sent to modem processor and is demodulated.Mobile communication module 151 can also be right
The modulated modulated signal amplification of demodulation processor, switchs to electromagenetic wave radiation through antenna 1 and goes out.In some embodiments, it moves
At least partly functional module of dynamic communication module 151 can be arranged in processor 110.In some embodiments, mobile logical
At least partly functional module of letter module 151 can be arranged in the same device at least partly module of processor 110.
Wireless communication module 152, can provide apply on electronic equipment 100 include WLAN (wireless
Local area networks, WLAN) (such as Wireless Fidelity (wireless fidelity, Wi-Fi) network), bluetooth
(bluetooth, BT), Global Navigation Satellite System (global navigation satellite system, GNSS), frequency modulation
(frequency modulation, FM), the short distance wireless communication technology (near field communication, NFC) are red
The solution of the wireless communications such as outer technology (infrared, IR).Wireless communication module 152 can be integrated into few communication
One or more devices of processing module.Wireless communication module 152 receives electromagnetic wave via antenna 2, by electromagnetic wave signal frequency modulation
And filtering processing, by treated, signal is sent to processor 110.Wireless communication module 152 can also connect from processor 110
Signal to be sent is received, frequency modulation is carried out to it, is amplified, is switched to electromagenetic wave radiation through antenna 2 and go out.
Electronic equipment 100 can also include Peripheral Interface, for input-output apparatus (such as the keyboard, mouse for outside
Mark, external-connection displayer, external memory, subscriber identification module card etc.) various interfaces are provided.Such as pass through universal serial bus
(USB) interface 130 is connect with mouse, passes through the SIM card of hard contact and operator's offer on subscriber identification module card card slot
Connection.Peripheral Interface can be used to the input/output peripheral equipment of said external being couple to processor 110 and storage inside
Device 121.
Electronic equipment 100 can also include charge management module 140 (such as battery 142 and the electricity powered to all parts
Source control module 141), battery 141 can be logically contiguous by power management module 141 and processor 110, to pass through charging
Management module 140 realizes the functions such as management charging, electric discharge and power managed.
Electronic equipment 100 can receive the input of key 190, generate the user setting and function control with electronic equipment 100
Make related key signals input.SIM card interface 195 in electronic equipment 100 is for connecting SIM card.SIM card can pass through insertion
SIM card interface 195, or extracted from SIM card interface 195, realization is contacting and separating with electronic equipment 100.
Although being not shown in Fig. 1, electronic equipment 100 can also include camera, such as front camera, postposition image
Head;It can also include motor, for generating vibration prompt (such as calling vibration prompt);It can also include that indicator such as indicates
Lamp, is used to indicate charged state, and electric quantity change can be used for instruction message, missed call, notice etc..Electronic equipment 100 is also
It may include blue-tooth device, positioning device, flash lamp, micro projector, near-field communication (near field
Communication, NFC) device etc., it will not be described here.
Following embodiment can be realized in the electronic equipment 100 with above structure.
In the scene that electronic equipment 100 shares screen to electronic equipment 200, based on electronic equipment 100 shown in FIG. 1
Structural schematic diagram is stored with the first software program 310 referring to Fig. 3 A in internal storage 121, when electronic equipment 100 is to electricity
When sub- equipment 200 (i.e. receiving device) shares screen, processor 110 can call first stored in internal storage 121 soft
Part program 310 is simultaneously run, wherein the first software program 310 may include multiple functional modules, respectively discovery connection management mould
Block 311, Streaming Media safety management module 312, multi-media module 313, data processing module 314 and data transmission module 315, respectively
The function of a module is as follows:
It was found that connection management module 311, for realizing discovery, agreement to electronic equipment 200 negotiation and with reception
The functions such as the connection of the communication channel between equipment.
Streaming Media safety management module 312, for realizing the sensitivity in the drawing data for identifying first content to be drawn
Data are mainly identified from three levels such as control layer, application layer and system layer, wherein sensitive data may include peace
Full sensitive control element, security sensitive application and system action associated safety sensitive behavior (also referred to as system sensitive behavior), later
Desensitization process, drawing data after being handled are carried out to sensitive data.
In some embodiments, to the sensitive data progress desensitization process identified, there are many implementations, for example scratch and remove
The sensitive data of each level, and make marks to the region scratched except sensitive data, the label is for being sent to coding in data
When device is encoded, the region scratched except sensitive data is filled up or other processing.For another example, for where sensitive data
Region is blocked or hides processing, or carries out filling up other contents to the corresponding region of sensitive data.Then, based on processing
Drawing data afterwards, draw control layer, application layer, the corresponding content of system layer, then will draw obtain control layer, application layer,
The corresponding content of system layer is synthesized, and the image data of the second content is obtained.
Multi-media module 313 for realizing the image data of the second content of crawl, and the image data of the second content is sent out
Give data processing module 314.
Data processing module 314 carries out image procossing for realizing the image data to the second content, schemes after being handled
As data.Wherein, image procossing is specifically as follows the first area in the image data of the second content of identification, the figure of first area
It shows that the character format of content is matched with the character format of default privacy information as data are corresponding, then, scratches and remove the second content
Image data in first area data.In some embodiments, the figure except the second content can be scratched by electronic equipment 100
Other contents are filled up as the data of the first area in data, and in first area, are sent to electronic equipment 200 later.Another
In some embodiments, image data after processing can also be transmitted directly to electronic equipment 200 by electronic equipment 100, be set by electronics
Standby 200 pairs have been scratched except the first area of data carries out filling up other contents, can reduce set in electronic equipment 100 with electronics in this way
The data volume transmitted between standby 200.
Data processing module 314 processing such as can also be encoded to image data after processing, encrypt, encapsulate, be obtained
Image data after the processing of encapsulation, and image data after the processing encapsulated is sent to data transmission module 315.
Data transmission module 315, for realizing image data after the processing encapsulated to receiving device transmission.
In the scene that electronic equipment 100 shares screen to electronic equipment 200, electronic equipment 200 is used as receiving device, electricity
The structure of sub- equipment 200 can also be with reference to hardware structure diagram shown in Fig. 1.Referring to Fig. 3 B, deposited in the inside of electronic equipment 200
The second software program 320 is stored in reservoir, when electronic equipment 200 can be electric when receiving the content of sharing of other equipment
The processor of sub- equipment 200 calls the second software program 320 stored in internal storage and runs, wherein the second software journey
Sequence 320 may include multiple functional modules, respectively discovery connection management module 321, multi-media module 322, data processing mould
Block 323 and data transmission module 324, the function of modules are as follows:
It was found that connection management module 321, for realizing the discovery of electronic equipment 100 (i.e. sharing equipment), the negotiation of agreement
And the functions such as the connection in channel.
Data transmission module 324, for realizing image data after the processing encapsulated that electronic equipment 100 is sent is received.
Data processing module 323, for realizing being decapsulated, decrypting, solving to the image data encapsulated received
Then image data after processing is sent to multi-media module 322 by the processing such as code, image data after being handled.Optionally,
After the processing received there is the region scratched and removed data in image data, and data processing module 323 can also be to having scratched divisor
According to region carry out filling up other contents, multi-media module 322 is then forwarded to, to avoid the region scratched except data in display
User experience is influenced in blank screen.
Multi-media module 322 carries out rendering broadcasting for realizing to image data after processing.
In conjunction with above-described embodiment and attached drawing, the embodiment of the present application provides a kind of method of sharing contents, and this method can be
It is realized in electronic equipment 100 with hardware configuration shown in FIG. 1.
Below using the first electronic equipment as equipment is shared, for the second electronic equipment is as receiving device, wherein first
Electronic equipment and the second electronic equipment may have the hardware configuration of electronic equipment 100 shown in FIG. 1, below to the application reality
The method for applying the sharing contents of example offer is introduced.
As described in foregoing teachings, during the first electronic equipment shares screen to the second electronic equipment, it may go out
The case where existing leakage of private information, illustratively, by taking the user interface 701 that the first electronic equipment in Fig. 7 A is shown as an example, wherein
Include setting sun picture in user interface 701, the bullet frame for prompting " someone sends file to you " is popped up in user interface 701
702, the first electronic equipment shares screen to the second electronic equipment at this time, then the second electronic equipment can be also shown in by playing frame 702
On, the user that the user of the first electronic equipment may be not intended to the second electronic equipment sees the content played in frame 702, thus
It will cause sensitive data leakage.For another example showing user circle for logging in e-bank with the first electronic equipment in Fig. 7 B
For face 711, user inputs bank card account number and password in input frame control 712, and the first electronic equipment is to second at this time
Electronic equipment shares screen, then bank card account number and password can be also shown in the second electronic equipment, to cause bank
The leakage of card Bank Account Number and password.
In order in the scene that screen is shared, improve the safety of sharing contents, the embodiment of the present application provides a kind of sharing
The method of content, the first electronic equipment need to draw out before showing the corresponding user interface of first content to be drawn
The image data of one content, is then delivered in display system and shows, the embodiment of the present application is being drawn in the second electronic equipment
Before the image data of the content of middle display, sensitivity number present in the drawing data of first content to be drawn first is identified
According to, specifically, control layer, application layer and the corresponding sensitive data of system layer in the drawing data of identification first content, and
Drawing data after desensitization process is handled is carried out to sensitive data, based on drawing data after processing, control layer is drawn respectively, answers
With layer, the corresponding content of system layer, synthesis obtains the image data of the second content, that is to say, that from control in the embodiment of the present application
Three hierarch recognition sensitive datas such as part layer, application layer and system layer, compared to the prior art in individually go to know from application layer
The scheme of other sensitive data, the application can more thoroughly identify sensitive data, share scene in screen so as to improve
The safety of middle sharing contents.
Moreover, the application first identified before drawing image data first content to be drawn for drawing data in
Sensitive data, and carry out desensitization process, compared to the prior art in the scheme to image data identification sensitive data, the application
It is improving while screen shares the safety that screen content is shared in scene, when can save the processing of sharing contents process
Between.
Further, it after the image data for obtaining the second content, the image data to the second content can also carry out again
Image data after image procossing is handled can be further improved and shield so as to further accurately identify sensitive data
Curtain shares the safety of sharing contents in scene.
Referring to fig. 4, a kind of process schematic of the sharing contents provided for application embodiment.
As shown in figure 4, the first electronic equipment obtains the drawing data of first content to be drawn, then according to first content
Drawing data draws two parts of image datas, a copy of it are as follows: according to the drawing data of first content, according to control layer, application layer,
And the image data of first content that system layer is drawn, the image data of the first content are used in the first electronic equipment
Upper display;Another are as follows: the first electronic equipment according to the drawing data of first content, identify control layer therein, application layer, with
And the corresponding sensitive data of system layer, and drawing data after desensitization process is handled, then root are carried out to the sensitive data
According to drawing data after processing, draw to obtain the image data of the second content according to control layer, application layer and system layer, and right
Second image data is encoded to obtain encoded images data, and encoded images data are sent to the second electronics later and are set
It is standby.Second electronic equipment receives the encoded images data that the first electronic equipment is sent, and to the encoded images received
Data are decoded, image data after being handled, and show image data pair after the processing in the display screen of the second electronic equipment
The second content answered.
Wherein, the image data of the image data of first content and the second content may be identical, it is also possible to not identical.If
It does not include sensitive data in first content to be drawn on first electronic equipment, then the image for the first content drawn
Data are identical with the image data of the second content.If in the first content to be drawn on the first electronic equipment including sensitive number
According to, then the image data of the image data for the first content drawn and the second content is not identical, wherein first content
Image data includes sensitive data, does not include sensitive data in the image data of the second content.
It is to be appreciated that only by the first electronic equipment to for for the second electronic equipment sharing contents in above-mentioned Fig. 4
Bright, i.e. the first electronic equipment is to share equipment, and the second electronic equipment is receiving device.Certainly, the second electronic equipment can also be with
To the first electronic equipment sharing contents, i.e., the second electronic equipment is to share equipment under this scene, and the first electronic equipment is to receive
Equipment.
Below for the first electronic equipment to the second electronic equipment share screen for, to triggering screen share mode into
Row is discussed in detail.
In order to make it easy to understand, the application following embodiment by with the first electronic equipment be Fig. 1 shown in structure electronic equipment
For 100, triggering sharing process provided by the embodiments of the present application is specifically addressed in conjunction with attached drawing.
Mode one, using interior sharing ScreenMode, i.e. the first electronic equipment can be pressed by the screen sharing function in application
Button gives the content share on screen to the second electronic equipment, introduces so that wechat is applied as an example how to realize that triggering screen is shared below
Function.
(a) shows the graphic user interface GUI of electronic equipment 100 in Fig. 5 A, which is the master of electronic equipment 100
Interface 210.By taking wechat is applied as an example, when electronic equipment 100 detects the icon of the wechat application acted in main interface 210
501 operation (as clicked), starts wechat application in response to the operation, shows another GUI as shown in (b) in Fig. 5 A, should
It include account control, password control and login control 502 in GUI.Control is logged in when electronic equipment 100 detects that user triggers
The operation of part 502 shows that the another GUI as shown in (c) in Fig. 5 A, the GUI include contact person, search control in response to the operation
Part and setting control 503 etc..It is aobvious in response to the operation when electronic equipment 100 detects the operation of triggering setting control 503
Show multiple controls, such as adding the control of friend, for sweeping the control swept, for bank settlement control and be used for
It is shared with the control 504 of other equipment.When electronic equipment 100 detects triggering, this is used to be shared with the control 504 of other equipment
Operation when, show the GUI505 as shown in (d) in Fig. 5 A in response to the operation, which includes multiple available devices
The corresponding control of title, such as equipment A, equipment B, equipment C and equipment D.This is acted on when electronic equipment 100 detects
The clicking operation of the corresponding control of the title of some available devices on GUI505, such as the corresponding control of pointing device C, response
Show that the another GUI as shown in (e) in Fig. 5 A, the GUI are the GUI506 for including prompted dialog frame in the clicking operation, this is mentioned
Show the prompt information and "Yes" and two controls of "No" included whether in dialog box by Screen sharing to equipment C.Wherein, such as
Fruit electronic equipment 100 detects that the "Yes" control clicked in GUI507, electronic equipment 100 will be sent to equipment C to sharing data,
It can show that one is used to refer to sharing data, while on the display screen 194 of electronic equipment 100 to which equipment C can be shown
Show the prompt column (being not shown in Fig. 5 A) for sharing screen to equipment C.If detecting the "No" control clicked in GUI507,
The display of the electronic equipment 100 such as GUI505 in (d) in Fig. 5 A, user can select other equipment to carry out screen in GUI 505
Share.
The triggering mode of aforesaid way one is suitable for the application with screen sharing function button, if do not had in
Screen sharing function button, then can realize that triggering screen was shared in such a way that following manner two is global screen sharing
Journey can also be shared under the scene of the application with screen sharing function button in the following way two triggering screens certainly
Journey.
Mode two, global screen share mode, can realize that screen is shared by the multi-screen interactive icon in status bar.
If (a) in Fig. 5 B shows the graphic user interface GUI of electronic equipment 100, which is electronic equipment 100
Main interface 210.When electronic equipment 100 detects the slide downward operation acted on status bar 201, in response to the slide downward
It may include multiple icons, such as wireless network icon, indigo plant in operation display another GUI as shown in (b) in Fig. 5 B, the GUI
(Huawei share) icon, offline mode is shared by tooth icon, mobile data icon, vibration icon, automatic Rotating icon, Huawei
Icon, flashlight icon, location information icon, screenshotss icon, eyeshield mode icon, hot spot icon and suspension navigation icon,
Super power saving icon, screen recording icon, interruption-free icon, NFC icon and multi-screen interactive icon 511 etc., it should be appreciated that Fig. 5 B
In these icons of (b) display can be more or less, the title of these icons is also with no restriction.It is with multi-screen interactive icon
Example after electronic equipment 100 detects the operation for clicking the multi-screen interactive icon 511, may be implemented to share screen to other equipment
Function, it should be noted that be only illustrated by taking " multi-screen interactive " this title as an example herein, but the application can realize triggering
The icon name for sharing screen function is without being limited thereto, for example can also be known as " Screen sharing ", " wireless to share " etc..
After electronic equipment 100 detects the clicking operation for acting on the multi-screen interactive icon 511, grasped in response to the click
Make the display another GUI as shown in (c) in Fig. 5 B, the GUI to be to include the GUI512 for searching for available devices, when electronics is set
After standby 100 search available devices, showing that the another GUI as shown in (d) in Fig. 5 B, the GUI are includes available devices
The GUI 513 of title.When electronic equipment 100 detects the title of some available devices on the click GUI513, in response to this
Clicking operation shows that the another GUI as shown in (e) in Fig. 5 B, the GUI are the GUI514 for including prompted dialog frame, the prompt pair
The prompt information and "Yes" and two controls of "No" by Screen sharing to equipment C are included whether in words frame.Wherein, work as electronics
Equipment 100 detects the "Yes" control clicked in GUI514, and electronic equipment 100 will be sent to equipment C to sharing data, to set
Standby C, which can be shown, can show that one is used to indicate to sharing data, while on the display screen 194 of electronic equipment 100
Share the prompt column of screen to equipment C.When electronic equipment 100 detects the operation for clicking the "No" control in GUI514, electricity
Sub- equipment 100 shows that the GUI 513 in (d) in such as Fig. 5 B, user can select other to set in GUI 513 in response to the operation
It is standby to carry out screen sharing.
Any one of above two triggering mode can realize that triggering electronic equipment 100 carries out screen to other equipment
The process of sharing, triggering sharing contents process after, the processor 110 of electronic equipment 100 obtained from display system to
The drawing data of the first content of drafting, and executing includes the image data for drawing the image data and the second content of first content
Etc. processes, finally obtain the image data of the first content for showing on electronic equipment 100 and in the second electronic equipment
Second content images data of display.
The process of 100 drawing image data of electronic equipment is described in detail below.
The display system of electronic equipment 100 can be layered and show with fragment, and referring to Fig. 6, layering can be divided into display system
Three layers of control layer, application layer and system layer etc., wherein the control in control layer is the composition unit using display interface, each
Control has an attribute setting of oneself, for example position, size, display layer are inferior, so display system can be according to the category of control
Property is provided with the synthesis using display interface.It, can using display interface using may include one or more application display interface
Including one or more controls and other contents, while applying display interface is also the display carrier of each control.And system
User interface UI may include the interface using display interface and some system actions, and wherein the interface of system action may include
Status bar, control group and some other control area (for example playing frame) etc..
Wherein, the drafting of control layer mainly draws the corresponding subregion of control in application, for answering
With the drafting of layer mainly to drawing in application using display interface, the drafting for system layer is mainly to state
Column, control group or other system control areas are drawn.So electronic equipment 100 is at drawing system interface (in i.e. first
Hold) before, it needs successively to calculate the position of the element of each layer according to control layer, application layer, system layer, size, display content, show
Show the information such as attribute (obtaining the drawing data of first content), is then calculated according to three layers of control layer, application layer, system layer etc.
Obtained information draws control layer, application layer, the corresponding content of system layer respectively, and synthesis obtains the image data of system interface,
The image data is shown as system interface on a display screen.
It, can before drawing the image data for the second content shown on the receiving device in the embodiment of the present application
According to the drawing data of first content, the i.e. position of the corresponding view of each layer such as control layer, application layer, system layer, size, display
The information such as content, display properties identify control layer, application layer, the corresponding sensitive data of system layer, and control to sensitive data
System (such as desensitization process) handle after drawing data, be then based on drawing data after the processing, respectively drafting control layer,
The corresponding content of application layer, system layer, synthesis obtains the image data of the second content, and the image data of the second content is sent
To the second electronic equipment, so that the second electronic equipment can show the second content according to the image data of the second content, thus real
Now improve the safety to receiving device sharing contents.
Below for control layer, application layer, three layers of system layer etc. of the sensitive number in the drawing data of identification first content
According to process be described in detail.
Multiple applications may be installed in the first electronic equipment, an application may generate multiple in the process of running
Using display interface, by taking one of application display interface (for example applying display interface A) as an example, this can using display interface A
It can include multiple controls, some controls are security sensitive control, such as the first electronics shown in Fig. 7 C on this application interface A
The input frame control 712 that the login interface 711 of the e-bank of the display screen display of equipment includes, for another example shown in Fig. 7 D
The input frame control 722 that the login interface 721 of the social software of the display screen display of first electronic equipment includes, for another example schemes
The income control 732 that the remaining sum interface 731 of the payment software of the display screen display of first electronic equipment shown in 7E includes, again
For example the transaction prompting interface 741 of e-bank's software of the display screen display of the first electronic equipment shown in Fig. 7 F includes
Transaction reminds control 742 and transaction to remind control 743, needs before sharing screen to the second electronic equipment quick to these safety
Sensing control part carries out desensitization process, and some controls are not security sensitive controls, such as the secure log control 717 in Fig. 7 C, then
For example the login control 725 in Fig. 7 D, these controls do not need to carry out desensitization process.This application involves security sensitive control be
Accuse that content is related to the control of sensitive data, privacy information etc. in part, is not repeating hereinafter.
It describes in detail below for the sensitive data for how identifying control level.
In some embodiments, the first electronic equipment can be according to the title of default security sensitive control, from first content
Drawing data in, the control with the name-matches of default security sensitive control is identified, as security sensitive control, wherein
Include display properties in the drawing data of one content, includes the title of control in display properties, can be got from display properties
The title of control to be identified, and be compared with the title of default security sensitive control, identify security sensitive control, then
Desensitization process is carried out to security sensitive control.
In further embodiments, security attribute can be set for control in development and application, is obtained in the first electronic equipment
When taking the drawing data of first content, security attribute can be got from display attribute information therein, is made in this way in user
In the scene for sharing screen with the first electronic equipment, the first electronic equipment can identify that control is according to the security attribute of the control
No is security sensitive control, if can show in receiving device, and optionally show when needing in receiving device display
Show effect, desensitization process then is carried out to the control for being related to sensitive data.Wherein security attribute can include but is not limited to
Under it is several:
Attribute one, if be the attribute of security sensitive control, whether this attribute can be used to indicate that the content in control
It is related to sensitive data, wherein security sensitive control refers to that the content in control is related to sensitive data, such as password box control, key
Disk control etc..
Illustratively, the value of attribute one can be used " being (True) " or " no (False) " to indicate, can also be otherwise
It indicates, herein with no restriction.By taking control A as an example, wherein the value of the corresponding attribute one of control A is that "Yes" indicates that control A is peace
Full sensitive control element, the value of the corresponding attribute one of control A are that "No" indicates that control A is not security sensitive control.Furthermore it is possible to controlling
When part A is not security sensitive control, the value of the attribute one of setting control A is "No", can not also set a property one for control A.
In specific implementation, the value that can determine the attribute one, is "Yes" when being worth, and carries out desensitization process to control A, when
Value is "No" or the value for the attribute one for not finding control A, it is believed that control A is not related to sensitive data, subsequent to draw
Make control A.
Attribute two, if in the attribute that receiving device is shown, this attribute can be used to indicate that whether control needs connecing
Receiving unit is shown.
Illustratively, " being (True) " or " no (False) " can be used in the value of attribute two, can also otherwise carry out table
Show, herein with no restriction.By taking control A as an example, for example, the value of the corresponding attribute two of control A is that "Yes" indicates that control A is needed remote
End display, the value of the corresponding attribute two of control A are that "No" indicates that control A does not need to show in receiving device, at this time can will not
Control A is hidden processing, covering treatment etc. to control A.
Before drawing control A, can first determine the value of the attribute two, when attribute two value be "Yes", draw the control
A, when the value of attribute two is "No", to control A progress desensitization process.
In the embodiment of the present application, can identify whether control is security sensitive control according to above-mentioned attribute one and attribute two respectively
Part, that is to say, that selection one of which identifies control, can also be identified according to above-mentioned attribute one and attribute two control A whether be
Security sensitive control.
In addition it is also possible to control A be identified in conjunction with above-mentioned attribute one and attribute two, when the value of the corresponding attribute one of control A
When for "Yes", the value of the corresponding attribute two of re-inspection control A is set if the value of the corresponding attribute two of control A is "Yes" in reception
Effect is carried out according to attribute three on standby to show;If the value of the corresponding attribute two of control A is "No", do not show on the receiving device
Control A.
Attribute three, the attribute that effect is shown.
Illustratively, effect shows can fill perhaps picture filling or other effects for pure color, as mosaic is imitated
The additional characters such as fruit, " * " are shown.
In the mechanism that the screen that existing Android (Android) is provided is shared, the activity of security identifier is only actively set
(Activity) window, which just will recognise that, comes, as shown in Figure 7 B, wherein having two in the user interface 711 that the first electronic equipment is shown
A Activity window, an Activity window are the interface Activity 713 logged in where the interface of e-bank, wherein
Including input frame control 712, another Activity window is the window 714 where keyboard control, wherein the interface Activity
713 are layered on the interface Activity 714.The strategy for the security identifier that Android is provided is provided with safety post using crawl
The interface Activity 713 of knowledge is shown as such as 716 institute of dotted line frame in such Fig. 7 B in the user interface 715 of the second electronic equipment
The blank screen identified, poor user experience.
Using the scheme of the application, referring to Fig. 7 C, the user interface 711 that the first electronic equipment is shown includes input frame control
712, it include the bank card account number of user's input in input frame control 712, in the packet of user interface 719 that the second electronic equipment show
It is shown as in the input frame control 718 included such as " * " additional character, the user of such second electronic equipment just can't see the first electronics
The bank card account number of user's input of equipment, while avoiding the leakage of bank card account number, can avoid the occurrence of as in Fig. 7 B
Blank screen.
In another example, the login of the social software of the display screen display of the first electronic equipment as illustrated in fig. 7d
The input frame control 722 that interface 721 includes, the wherein input of input frame control 722 has account and password, using the side of the application
Case, it is aobvious in the input frame control 724 that the login interface 723 that the second electronic equipment show includes when sharing to the second electronic equipment
Show such as " * " additional character, can protect the account shown on the first electronic equipment with password in sharing screen scene in this way, it will not
It is shown on the display screen of the second electronic equipment.
In yet another example, as seen in figure 7e, the remaining sum of the payment software of the display screen display of the first electronic equipment
The income control 732 that interface 731 includes is shared including information such as remaining sum and accumulated earnings using the scheme of the application
When to the second electronic equipment, display such as " * " is special in the income control 734 that the remaining sum interface 733 that the second electronic equipment is shown includes
Different symbol can protect the information such as the remaining sum shown on the first electronic equipment and accumulated earnings in sharing screen scene in this way,
It will not be shown on the display screen of the second electronic equipment.
In yet another example, e-bank's software of the display screen display of the first electronic equipment as shown in Figure 7 F
Transaction remind interface 741 include transaction remind control 742 and transaction remind control 743, including the amount of money, account and
The information such as remaining sum, using the scheme of the application, when sharing to the second electronic equipment, transaction prompting circle that the second electronic equipment show
Control 745 is reminded in the transaction that face 744 includes and control 746 is reminded in transaction, and display blocks picture, can protect the first electronics in this way
The information such as the amount of money, account and the remaining sum that show in equipment will not be shown in the second electronic equipment in sharing screen scene.
In above-described embodiment of the application, on the one hand desensitization process can be carried out for control granularity, such as according to control
The value of the attribute two of part identifies security sensitive control, can be determined whether to be shown in the second electronic equipment according to the value of attribute three
On, the effect that the second electronic equipment on the other hand can be arranged in using the value of attribute three is shown, can make to show in this way
Security sensitive control regions in the second electronic equipment will not be blank screen, so as to promote user experience.
It describes in detail below for the sensitive data for how identifying application level.
Multiple applications may be installed in the first electronic equipment, by taking one of application (applying A) as an example, using A
It may generate in the process of running multiple using display interface.In some instances, equal using all application display interfaces of A
Need to carry out desensitization process, for example applying A is bank client application, since all applications of bank client application show boundary
Face likely relates to sensitive data, therefore all application display interfaces require to carry out desensitization process.In other examples
In, desensitization process is needed using certain application display interfaces of A, some do not need desensitization process using display interface, for example answer
It is wechat with A, since the login display interface of microblogging likely relates to sensitive data, login interface desensitizes
Processing, and the blog article display interface of microblogging then can be without desensitization process.
In a kind of possible implementation, it can be identified in such a way that black and white lists are set using whether being security sensitive
Using including one or more in white list for example, including the mark of one or more preset security sensitives applications in blacklist
The mark of a preset non-security sensitive application.In specific implementation, the first electronic equipment can pass through the drafting from first content
The mark of application is obtained in the display properties that data include, whether identification belongs to the application for including in blacklist using A, if so,
Then determining that this applies A is preset security sensitive application, then desensitization process is carried out to the display interface using A, it is subsequent to draw
Process processed using the display interface of A to drawing after desensitization process;If not, it is determined that this is not preset safety using A
Sensitive application, subsequent drawing process using display interface to normally being drawn using A.First electronic equipment can also lead to
It crosses identification and whether belongs to the application for including in white list using A, if so, determining that this is answered using A for preset non-security sensitivity
With subsequent drawing process can be to the drawing using display interface using A;If not, it is determined that this is not preset using A
Non-security sensitive application, subsequent drawing process using display interface to normally being drawn using A.
By the identification for being made whether to apply for security sensitive to application, some security sensitive applications, such as silver can be made
The user interface of the application of row class or payment class application, will not be shared with other equipment automatically.
In alternatively possible mode, application can may include it is multiple using display interface, in some applications not
It is that all application display interfaces are directed to sensitive data, it is possible to which boundary is shown to the application for being related to sensitive data in application
Face is set as security sensitive interface, desensitization process can be carried out to security sensitive interface, to desensitization process in subsequent drawing process
It is drawn at security sensitive interface afterwards.Be not related to sensitive data in is non-security sensitive boundary using display interface
Face directly draws non-security sensitive interface in subsequent drawing process.
By taking wechat is applied as an example, in the case where some share scene, user thinks that wechat is security sensitive application, in other points
Enjoying user under scene may think that wechat is security sensitive application, for point that user can voluntarily select to be suitble to special scenes
Mode is enjoyed, can prompt the user with before drawing system UI and whether share wechat application, for example, the first electronic equipment is
Share screen to the second electronic equipment, the first electronic equipment is in response to the operation of the click wechat application of user, and starting wechat is simultaneously
It displays the prompt box, wherein prompting frame is for prompting the user to choose whether to set security sensitive application for wechat application.For another example,
First terminal is showing the chat interface of wechat application, at this time if user triggers screen sharing operation, the first electronic equipment
It in response to screen sharing operation, triggers screen and shares process, and display the prompt box on a display screen, wherein prompting frame is for prompting
User chooses whether to set security sensitive application for wechat application.Prompting frame may include two options: be and no, the first electricity
Sub- equipment may be in response to the operation that click option is, set security sensitive application for wechat application, alternatively, the first electronic equipment
It may be in response to the no operation of click option, set non-security sensitive application for wechat application.
It should be understood that may have security sensitive interface in, it is also possible to have non-security sensitive interface, in the field for sharing screen
Jing Zhong can also need to show each using display interface, prompt the user to choose whether to set this to using display interface
Security sensitive interface.It can be found in the prompting mode for application using the prompting mode of display interface, details are not described herein again.
Below for how the sensitive data of identifying system level describes in detail.
For system level, under the scene for much sharing screen, playing the system actions such as frame, status bar, plant seeds by airplane subtitle can
It can be related to sensitive data, the system action for being involved in sensitive data becomes system sensitive behavior.
In a kind of possible implementation, system is normally plotted in the system UI of local (i.e. sharing equipment) display, is drawing
When the system UI that system is used to show on the receiving device, the system sensitive behavior in the drawing data of first content is identified, such as
It will be identified as system sensitive behavior with the matched system action of default sensitive behavior, and desensitization process is carried out to system sensitive behavior
Then drawing data after being handled is drawn to obtain the image data of the second content according to drawing data after processing.Show some
In example, the system sensitives behaviors such as the system bullet frame for being related to sensitive data or status bar suggestion content can not be drawn, another
In a little examples, the processing such as transparence or blurring can also be carried out to system sensitive behavior or blocks or replaces or hide.
Referring to Fig. 7 A, the first electronic equipment shares setting sun picture to the second electronic equipment, at this time the first electronic equipment
The file for receiving other users transmission, at lower a moment, the user interface including setting sun picture that is shown on the first electronic equipment
701 pop up the bullet frame 702 for prompting " someone sends file to you ", using the scheme of the application, may be implemented in the second electricity
Show that user interface 703, user interface 703 do not include playing frame 702 in sub- equipment.
It should be noted that the identification method of above three level can be used alone, can also be used in combination, herein not
It repeats again.For example, the operation of identification security sensitive control is only carried out to the control layer in the drawing data of first content, to application
Operation with two levels of system without identification security sensitive application, then in control layer after identifying security sensitive control
Security sensitive control carry out desensitization process, drawing data after being handled.Later, control is drawn based on drawing data after processing
Layer, application layer, the content of system layer, synthesis obtain the image data of system UI to get to the image data of the second content.Compare again
Such as, three above-mentioned control layer, application layer, system layer levels are all carried out with the operation of identification sensitive data, then identifying control
The corresponding sensitive data of part layer, application layer, system layer simultaneously carries out desensitization process, then respectively draw control layer, application layer,
The content of system layer, synthesis obtain the image data of system UI, obtain the image data of the second content, in this way can be more thorough
It identifies sensitive data, and carries out desensitization process.
By the above process, can draw not included sensitive data the second content image data.In order into one
Step guarantees the safety of sharing contents, can also be to the figure of the second content after drafting obtains the image data of the second content
As data progress image procossing, image data after being handled, wherein image procossing is quick from the progress of security sensitive content level
Feel the identification of data, and sensitive data scratch and is removed, image data after being handled, wherein security sensitive content can be control
Interior display information, text control etc., such as sensitive data involved in the content of identification control.Then picture number after handling
According to being sent to the second electronic equipment, correspondingly, the second electronic equipment receives after processing after image data, according to scheming after processing
As data show the second content.
Wherein, image procossing is to identify that sensitive data, disclosure level can be in control from content level
The information of display, such as the content in text control, can display text information in text control, it is also possible in graphical control
Image information is shown in content, graphical control, it is also possible to the control of other forms.Below with the image of the second content of identification
It is illustrated for control content in data.
In order to realize identification control content, several possible realization sides presented below in the scene that screen is shared
Formula.
In one possible implementation, text can be used the modes such as extract and identify character string in image, then with number
It is compared according to the character string in library, this mode needs the data volume in matched database big, and the speed of service is slow.
In alternatively possible implementation, the first electronic equipment can be identified from the image data of the second content
First area, and scratch except first area data, wherein the character format of the corresponding content of the data of first area with preset it is hidden
The character format matching of personal letter breath, image data after being handled.
In some instances, artificial intelligence (artificial intelligence, AI) security model can be used, is known
User privacy information involved in the image data of other second content content area (be referred to as sensitive data region, i.e., on
State first area), such as identification identification card number, Bank Account Number etc..
Wherein, common individual privacy information is a finite aggregate, and main contents may include: name (first name and last name), in detail
Thin mailing address, country, province/city, postcode, age, gender, nationality, date of birth, birthplace, marital status, education journey
Degree, kinsfolk's (relationship, name etc.), telephone number, fax number, email address, address list, short message, in instant messaging
Hold (social softwares such as wechat), message registration, photo, video, recording, international mobile equipment identification number (international
Mobile equipment identity, IMEI), international mobile subscriber identity (international mobile
Subscriber identification number, IMSI), biometric identification (fingerprint, iris etc.), general position number
According to, precise position information, the configuration data of end-user electronic equipment, account ID (such as Huawei's account), Internet protocol
The address (internet protocol, IP), media access control (media access control address, MAC)
Location, Bank Account Number, authoritative Social recognition number (identification card number, passport No., license number, social security number etc.), credit card trade letter
Breath, financial information, health and fitness information, password, facial characteristics mark, DNA (deoxyribonucleic acid,
DNA) sequence and sampling, user preferences and behavioural habits, browsing record, ethnic blood lineage, political point view, religion or philosophical faith,
Sexual life, previous conviction (criminal, folk crime and court document), labour union's record, children's information, license plate number etc..
The specific representation in the face on an electronic device of these above-mentioned individual privacy informations, it is practical also to have fixed lattice
Formula, can be by machine learning with extracting correlation model, such as account ID (such as Huawei's account), password, IP address, MAC
Location, Bank Account Number, authoritative Social recognition number (identification card number, passport No., license number, social security number etc.), IMEI, IMSI etc. are all
There is fixed format data character to indicate, the feature that display length, format and content etc. all can serve as its display is mentioned
It takes;Name (first name and last name), marital status, education degree, kinsfolk's (relationship, name etc.), health and fitness information race's blood for another example
System, political point view, religion or philosophical faith etc. also have specific descriptor format or term text, and can pass through study
Extraction feature.
Since individual privacy information is controllable limited information set, user privacy information type and coverage are limited,
And the form of expression in its face at the terminal is relatively uniform, therefore the data model extracted is relatively easy, and using optimizing
Data model simultaneously, whole identification includes the image-region of privacy information, without identifying specific picture material, Ke Yida
To the effect for reducing calculation amount, and at present, many electronic equipments all have GPU acceleration technique, can achieve quickly identification safety
Sensitive content, while the effect of content share is not influenced.
In specific implementation, it before identifying sensitive data using AI security model, needs to realize by training dataset
The study and foundation of AI security model, certainly, training process can be to be carried out on the first electronic equipment, is also possible to other
Equipment (such as server, other electronic equipments) completes the establishment process of AI security model using mass data collection, then will be trained
To AI security model be stored in advance in the first electronic equipment, herein with no restrictions.
Below by taking the training of the first electronic equipment obtains AI security model as an example, to using the AI security model to identify sensitive number
According to process be described, the embodiment of the present application is not caused to limit.
Referring to Fig. 8, the study and foundation of AI model provided by the embodiments of the present application and the flow diagram used.
As shown in figure 8, introducing the study and establishment process of AI model first.
The foundation of AI model is needed to realize by learning training data set, can be selected big before establishing AI model
Spirogram piece forms picture set, and including picture and normal picture containing privacy information, user can be voluntarily in picture set
Picture tag, can also be tagged to picture using Machine Method, the label of each picture can be " containing privacy information "
Label or " normal " label.Then, the picture of " containing privacy information " label will be had as positive training dataset, had " normal "
The picture of label is input in AI initial model and is trained as anti-training dataset, for example carries out the inspection of sensitive data feature
It surveys and extracts, and then generate secret protection model, be referred to as AI security model.After generating AI security model, into one
The accuracy rate of test set assessment AI security model identification security sensitive content can be used in step, and may be implemented to AI security model
It is adjusted.
The process using AI security model is described further below.
Based on above content, after the image data for obtaining the second content, the image data of the second content can be inputted
The sensitive data in image data into AI security model, to realize the second content of identification.Further according to the output knot of AI model
Fruit judges with the presence or absence of sensitive data in the image data of the second content, if the result of AI security model output indicates the second content
Image data in there are sensitive data, then the first electronic equipment carries out desensitization process to sensitive data region, handled
Image data afterwards.The processing such as encoded, encrypted to image data after processing again;If the result of AI security model output indicates the
Sensitive data is not present in the image data of two contents, then the processing such as encoded, encrypted to the image data of the second content.
It, can be before drawing system UI, to the control in the drawing data of first content, application in the embodiment of the present application
And three hierarch recognition sensitive datas of system and desensitization process is carried out, then according to three levels after desensitization process
Data are drawn to obtain the image data of the second content, later, security sensitive content level can be directed to again, using the safe mould of AI
Type carries out sensitive data identification to the image data of the second content, and to sensitive data region further progress desensitization process, obtains
Image data after to processing may further ensure that the safety to the second electronic equipment sharing contents in this way.
In the embodiment of the present application, image procossing is carried out in image data of first equipment to second content, is obtained everywhere
After reason after image data, due to including the first area scratched except data in image data after processing, in this way when showing the
One region will appear blank screen, and in order to promote user experience, in a kind of possible implementation, the first electronic equipment is to firstth area
Domain carries out rendering processing, so that rendering other contents on the first area, for example does not include the content of sensitive data, then again will
Rendered image data is sent to the second electronic equipment, so that the second electronic equipment is shown in second according to the image data received
Rong Shi, first area are not blank screens, so as to promote user experience.
In another implementation, image data after processing can be sent to the second electronics and set by the first electronic equipment
Standby, wherein image data includes the stingy first area except data after processing, the second electronic equipment is received to be set from the first electronics
Image data after standby processing, and rendering processing is carried out to the first area in image data after the processing, then according to warp
Crossing rendering, treated that image data shows the second content on the display screen.Compared to former implementation, the realization
Mode can reduce the data volume that the first electronic equipment sends data to the second electronic equipment.
Below with reference to Fig. 9, (i.e. security sensitive application processing, security sensitive control in a manner of the identifying processing of four levels
Processing, system sensitive behavior processing and security sensitive contents processing) be used in combination for, be discussed in detail and above-mentioned sharing can be achieved
A kind of possible mode of content and method.As shown in figure 9, the sharing contents method is applied in the first electronic equipment, this method
Include the following steps:
Step 901, the mark of application to be shared is obtained.
Step 902, judge the default application identities of application to be shared identified whether to include in blacklist;If so,
Step 903 is executed, if it is not, thening follow the steps 904;
Above-mentioned steps 901- step 902 is security sensitive applicable procedures.
Step 903, it determines wait sharing using being security sensitive application, prompting user's processing or using other safeguard protections
Behavior.
After step 903, system sensitive behavior processing and security sensitive content management process, i.e. step are directly carried out
After 903, step 908 is directly carried out, does not execute step 904- step 907.
Step 904, the control in the current interface of application to be shared is traversed, later, continues step 905.
Step 905, judge whether control is security sensitive control;If so, 906 are thened follow the steps, if it is not, thening follow the steps
907;
Step 906, according to the effect display properties of security sensitive control, security sensitive control display area is covered.
Herein, it is only illustrated by taking covering effect as an example, but is not limited to this effect, effect display properties may refer to
State the related content of attribute three.
Step 907, the interface of system synthesis application level.
Above-mentioned steps 903- step 907 is security sensitive control treatment process.
Step 908, system sensitive behavior is judged whether there is;If so, 909 are thened follow the steps, if it is not, thening follow the steps
910。
Wherein, system sensitive behavior may include being related to the status bar content, control group content, system bullet of sensitive data
Frame, using class bullet frame etc..
Step 909, filtration system sensitive behavior.
Illustratively, as shown in Figure 7 A, " having in the user interface 701 that the first electronic equipment of system sensitive behavior is shown
People sends file to you " frame 702 is played, filter the bullet frame 702, it can draw the bullet frame 702, show in the second electronic equipment
It does not include the bullet frame 702 in user interface 703.
Above-mentioned steps 908- step 909 is system sensitive behavior treatment process.
Illustrate in conjunction with Fig. 3 A, above-mentioned steps 901-909 can be realized by Streaming Media safety management module 312.
Step 910, according to the interface at the interface of application level and system action, a frame image data is synthesized.
Illustratively, the control in content to be drawn can be formed and apply display interface, will using display interface and
System UI synthesizes user interface (referred to hereinabove as system interface), i.e. a frame image data together.
Illustrate in conjunction with Fig. 3 A, above-mentioned steps 910 can be realized by multi-media module 313.
Step 911, identify a frame image data with the presence or absence of security sensitive content;If so, 912 are thened follow the steps, if
It is no, then follow the steps 913;
Step 912, the display area of security sensitive content is subjected to covering treatment, image data after being handled.
Certainly, it is also possible here to use scratch remove, replace, hide etc. modes to the display area of security sensitive content at
It manages, only illustrates by taking covering treatment as an example in step 912.
Above-mentioned steps 911- step 912 is security sensitive content management process, is illustrated in conjunction with Fig. 3 A, above-mentioned steps 910
It can be realized by data processing module 314.
Step 913, image data after processing is encoded.Later, the image after sending coding to the second electronic equipment
Data.
By embodiment shown in Fig. 9, the content that the display screen display of the first electronic equipment may be implemented is selective
Be shown in the second electronic equipment, that is, be involved in sensitive data content handled after so that the sensitivity identified
Data will not be shown in the second electronic equipment, so as to protect the personal secrets of the first electronic equipment.
After being handled through the foregoing embodiment after image data, in order to further increase the safety of data transmission
Property, image data after processing can be encoded, optionally, be schemed after can also being encrypted to coded data
As data, image data after encryption is then sent to the second electronic equipment, in this way if after other equipment receive the encryption
Image data is also unable to get image data after true processing.Correspondingly, the second electronic equipment is schemed after receiving the encryption
As after data, be decrypted, decode handled after image data, and show on a display screen handle after image data.
Angle in above-mentioned embodiment provided by the present application, from the first electronic equipment (electronic equipment 100) as executing subject
Degree is described method provided by the embodiments of the present application.It is each in above-mentioned method provided by the embodiments of the present application in order to realize
Function, mobile device may include hardware configuration and/or software module, be added with hardware configuration, software module or hardware configuration soft
The form of part module realizes above-mentioned each function.Some function in above-mentioned each function is with hardware configuration, software module or hard
Part structure adds the mode of software module to execute, the specific application and design constraint depending on technical solution.
The embodiment of the present application also provides the graphic user interface GUI in a kind of electronic equipment, which has display
Screen, memory, one or more processors, one or more of processors are for executing one be stored in the memory
Or multiple computer programs, the graphic user interface may include: that the electronic equipment executes above-mentioned first electronic equipment and executes
Method, or the graphic user interface that while executing the method that above-mentioned second electronic equipment executes shows.
It is used in above-described embodiment, based on context, term " when ... " can be interpreted to mean " if ... " or
" ... it is rear " or " in response to determination ... " or " in response to detecting ... ".Similarly, based on context, phrase " when in determination ... "
Or " if detecting (condition or event stated) " can be interpreted to mean " if it is determined that ... " or " in response to true
It is fixed ... " or " when detecting (condition or event stated) " or " in response to detecting (condition or event stated) ".
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When implemented in software, it can entirely or partly realize in the form of a program product.Described program product includes one
Or multiple computer instructions.When loading and execute on computers described program instruction, entirely or partly generate according to this Shen
It please process or function described in embodiment.The computer can be general purpose computer, special purpose computer, computer network or
Other programmable devices of person.The computer instruction may be stored in a computer readable storage medium, or calculate from one
Machine readable storage medium storing program for executing is transmitted to another computer readable storage medium, for example, the computer instruction can be from a net
Website, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line) or wireless (example
Such as infrared, wireless, microwave) mode transmitted to another web-site, computer, server or data center.It is described
Computer readable storage medium can be any usable medium that computer can access or include one or more available
The data storage devices such as medium integrated server, data center.The usable medium can be magnetic medium, (for example, soft
Disk, hard disk, tape), optical medium (such as DVD) or semiconductor medium (such as solid state hard disk) etc..
For purposes of explanation, the description of front is described by reference to specific embodiment.However, above
Illustrative discuss is not intended to be the precise forms disclosed in being also not intended to for the application being restricted in detail.According to
Above teaching content, many modifications and variations are all possible.Selection and description embodiment are to fully state
The principle and its practical application of the application, with so that others skilled in the art can make full use of have be suitable for
The application of the various modifications for the special-purpose conceived and various embodiments.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, the process
Relevant hardware can be instructed to complete by computer program, which can be stored in computer-readable storage medium, should
Program is when being executed, it may include such as the process of above-mentioned each method embodiment.And storage medium above-mentioned includes: ROM or deposits at random
Store up the medium of the various program storage codes such as memory body RAM, magnetic or disk.
Claims (10)
1. a kind of method of sharing contents, applied to first electronic equipment with display screen, which is characterized in that the method
Include:
Detect the first operation for sharing screen to the second electronic equipment;
In response to first operation, the communication connection between second electronic equipment is established;
Obtain the drawing data of first content to be drawn;The drawing data includes that control layer, application layer, system layer are corresponding
The position of view, size, display content, display properties;
Based on the drawing data of the first content, control layer, application layer, the corresponding content of system layer are drawn respectively, is synthesized
To the image data of the first content;
Identify control layer, application layer and the corresponding sensitive data of system layer in the drawing data of the first content, and right
The sensitive data carries out drawing data after desensitization process is handled;
Based on drawing data after the processing, control layer, application layer, the corresponding content of system layer are drawn respectively, synthesis obtains the
The image data of two contents;
The first content is shown on the display screen according to the image data of the first content, and to second electronics
Equipment sends the image data of second content.
2. the method as described in claim 1, which is characterized in that described to send second content to second electronic equipment
Image data, comprising:
Image procossing, image data after being handled are carried out to the image data of second content;Described image is handled
It identifies first area, and scratches the data except the first area, wherein the character format of the corresponding content of the data of first area
It is matched with the character format of default privacy information;
Image data after sending the processing to second electronic equipment.
3. method according to claim 2, which is characterized in that the identification first area, comprising:
The first area in the image data of second content is identified using artificial intelligence AI security model;Wherein, institute
State what the picture with privacy information label and the picture with normal tag according to AI security model were trained.
4. method as claimed in claim 2 or claim 3, which is characterized in that described image processing further include:
Rendering processing is carried out to the first area scratched except data.
5. the method according to claim 1, which is characterized in that the drawing data of the identification first content
In control layer, application layer and the corresponding sensitive data of system layer, and to the sensitive data carry out desensitization process obtain everywhere
Drawing data after reason, comprising:
Identify the security sensitive application in the drawing data of the first content, the security sensitive is using for Apply Names and in advance
If the application of the name-matches of security sensitive application;
Identify that the security sensitive control in the drawing data of the first content, the security sensitive control are security attribute information
Value be preset value control, alternatively, the security sensitive control is control with the name-matches of default security sensitive control;
Identify the system sensitive behavior in the drawing data of the first content;The system sensitive behavior and default sensitive behavior
Matching;
Corresponding data, the security sensitive control pair are applied to the security sensitive in the drawing data of the first content
The corresponding data of the data and the system sensitive behavior answered carry out desensitization process, drawing data after being handled.
6. a kind of method of sharing contents, applied to second electronic equipment with display screen, which is characterized in that the method
Include:
When receiving the request of the sharing screen from first electronic equipment, the second electronic equipment is established and described first
Communication connection between electronic equipment;
Image data after processing of the reception from the first electronic equipment;Image data includes stingy except the of data after the processing
One region;
Rendering processing carried out to the first area in image data after the processing, and according to by rendering treated picture number
According to showing the second content on the display screen.
7. the graphic user interface in a kind of electronic equipment, which is characterized in that the electronic equipment have display screen, camera,
Memory and one or more processors, one or more of processors are used to execute and store in the memory
One or more computer programs, which is characterized in that the graphic user interface includes that the electronic equipment is executed as right is wanted
The graphic user interface shown when method described in asking any one of 1 to 6.
8. a kind of electronic equipment, which is characterized in that including processor and memory;
The memory is stored with one or more computer programs;
When one or more computer programs of memory storage are executed by the processor, so that the electronic equipment
It is able to carry out method as claimed in claim 1 to 5, alternatively, executing method as claimed in claim 6.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, when computer program is run on an electronic device, so that the electronic equipment is executed as described in claim 1 to 5 is any
Method, alternatively, execute method as claimed in claim 6.
10. a kind of computer program product comprising instruction, which is characterized in that when the computer program product is in electronic equipment
When upper operation, so that the electronic equipment executes method as claimed in claim 1 to 5, alternatively, executing such as claim
Method described in 6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910498149.XA CN110378145B (en) | 2019-06-10 | 2019-06-10 | Method and electronic equipment for sharing content |
PCT/CN2020/095022 WO2020248955A1 (en) | 2019-06-10 | 2020-06-09 | Content sharing method and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910498149.XA CN110378145B (en) | 2019-06-10 | 2019-06-10 | Method and electronic equipment for sharing content |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110378145A true CN110378145A (en) | 2019-10-25 |
CN110378145B CN110378145B (en) | 2022-04-22 |
Family
ID=68250026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910498149.XA Active CN110378145B (en) | 2019-06-10 | 2019-06-10 | Method and electronic equipment for sharing content |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110378145B (en) |
WO (1) | WO2020248955A1 (en) |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110865654A (en) * | 2019-12-06 | 2020-03-06 | 河南送变电建设有限公司 | Power grid unmanned aerial vehicle inspection defect processing method |
CN110989950A (en) * | 2019-11-15 | 2020-04-10 | 维沃移动通信有限公司 | Sharing control method and electronic equipment |
CN111131882A (en) * | 2019-12-30 | 2020-05-08 | 联想(北京)有限公司 | Screen recording method and device and electronic equipment |
CN111143880A (en) * | 2019-12-27 | 2020-05-12 | 中电长城网际系统应用有限公司 | Data processing method and device, electronic equipment and readable medium |
CN111177694A (en) * | 2019-12-16 | 2020-05-19 | 华为技术有限公司 | Method and device for processing data |
CN111198954A (en) * | 2019-11-28 | 2020-05-26 | 深圳市跨越新科技有限公司 | Method and system for structured analysis of order placement address |
CN111290721A (en) * | 2020-01-20 | 2020-06-16 | 北京大米未来科技有限公司 | Online interaction control method, system, electronic device and storage medium |
CN111290722A (en) * | 2020-01-20 | 2020-06-16 | 北京大米未来科技有限公司 | Screen sharing method, device and system, electronic equipment and storage medium |
CN111309938A (en) * | 2020-01-22 | 2020-06-19 | 恒大新能源汽车科技(广东)有限公司 | Multimedia file processing method and device |
CN111338721A (en) * | 2020-01-20 | 2020-06-26 | 北京大米未来科技有限公司 | Online interaction method, system, electronic device and storage medium |
CN111488190A (en) * | 2020-03-31 | 2020-08-04 | 腾讯科技(深圳)有限公司 | Screen sharing method and device, computer equipment and storage medium |
WO2020248955A1 (en) * | 2019-06-10 | 2020-12-17 | 华为技术有限公司 | Content sharing method and electronic device |
CN112511601A (en) * | 2020-11-16 | 2021-03-16 | 北京仁光科技有限公司 | Multi-screen data interaction system and multi-screen data interaction method |
CN113050900A (en) * | 2021-03-17 | 2021-06-29 | 平安普惠企业管理有限公司 | Screen sharing method, device, equipment and storage medium |
US11082374B1 (en) | 2020-08-29 | 2021-08-03 | Citrix Systems, Inc. | Identity leak prevention |
CN113222809A (en) * | 2021-05-21 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Picture processing method and device for realizing privacy protection |
US11165755B1 (en) | 2020-08-27 | 2021-11-02 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
CN113704824A (en) * | 2021-08-31 | 2021-11-26 | 平安普惠企业管理有限公司 | Synchronous generation method, device and equipment of page guide mark and storage medium |
CN113778360A (en) * | 2021-08-20 | 2021-12-10 | 荣耀终端有限公司 | Screen projection method and electronic equipment |
CN113791713A (en) * | 2021-09-01 | 2021-12-14 | 远峰科技股份有限公司 | Vehicle multi-screen display window sharing method and device |
US11201889B2 (en) | 2019-03-29 | 2021-12-14 | Citrix Systems, Inc. | Security device selection based on secure content detection |
CN114553844A (en) * | 2022-03-09 | 2022-05-27 | 润芯微科技(江苏)有限公司 | Method for sharing screen during video |
US11361113B2 (en) | 2020-03-26 | 2022-06-14 | Citrix Systems, Inc. | System for prevention of image capture of sensitive information and related techniques |
CN114827519A (en) * | 2022-04-08 | 2022-07-29 | 咪咕文化科技有限公司 | Processing method and device for sharing content, sharing terminal and storage medium |
CN114860178A (en) * | 2021-01-18 | 2022-08-05 | 华为技术有限公司 | Screen projection method and electronic device |
US11450069B2 (en) | 2018-11-09 | 2022-09-20 | Citrix Systems, Inc. | Systems and methods for a SaaS lens to view obfuscated content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11582266B2 (en) | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
WO2024045764A1 (en) * | 2022-08-31 | 2024-03-07 | 中兴通讯股份有限公司 | Display method and apparatus, terminal, electronic device and storage medium |
WO2024051634A1 (en) * | 2022-09-06 | 2024-03-14 | 华为技术有限公司 | Screen projection display method and system, and electronic device |
US11977932B2 (en) | 2020-08-27 | 2024-05-07 | Honor Device Co., Ltd. | Information sharing method and apparatus, terminal device, and storage medium |
WO2024109509A1 (en) * | 2022-11-25 | 2024-05-30 | 华为技术有限公司 | Content acquisition method, readable storage medium, program product and electronic device |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118915939A (en) * | 2020-12-18 | 2024-11-08 | 华为技术有限公司 | Application sharing method, electronic device and storage medium |
CN112989408A (en) * | 2021-03-03 | 2021-06-18 | Oppo广东移动通信有限公司 | Screenshot processing method, screenshot processing device, electronic equipment and storage medium |
CN114692202B (en) * | 2022-03-31 | 2024-07-30 | 马上消费金融股份有限公司 | Image processing method, device, electronic equipment and storage medium |
CN116049867B (en) * | 2022-07-21 | 2024-04-02 | 荣耀终端有限公司 | Anti-fraud method, graphical interface and related device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100907A (en) * | 2014-04-28 | 2015-11-25 | 宇龙计算机通信科技(深圳)有限公司 | Selective screen projection method and device thereof |
CN106603667A (en) * | 2016-12-16 | 2017-04-26 | 北京小米移动软件有限公司 | Screen information sharing method and device |
CN107333118A (en) * | 2017-07-17 | 2017-11-07 | 上海青橙实业有限公司 | The control method and device of project content |
CN107580105A (en) * | 2017-07-26 | 2018-01-12 | 努比亚技术有限公司 | A kind of screen sharing method, terminal and computer-readable recording medium |
US20180121663A1 (en) * | 2016-11-01 | 2018-05-03 | Microsoft Technology Licensing, Llc | Sharing Protection for a Screen Sharing Experience |
CN108038396A (en) * | 2017-12-05 | 2018-05-15 | 广东欧珀移动通信有限公司 | Screen recording method and device and terminal |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180053003A1 (en) * | 2016-08-18 | 2018-02-22 | Qualcomm Incorporated | Selectively obfuscating a portion of a stream of visual media that is streamed to at least one sink during a screen-sharing session |
CN108197495A (en) * | 2018-01-16 | 2018-06-22 | 挖财网络技术有限公司 | The guard method of sensitive information and device in application program |
CN110378145B (en) * | 2019-06-10 | 2022-04-22 | 华为技术有限公司 | Method and electronic equipment for sharing content |
-
2019
- 2019-06-10 CN CN201910498149.XA patent/CN110378145B/en active Active
-
2020
- 2020-06-09 WO PCT/CN2020/095022 patent/WO2020248955A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100907A (en) * | 2014-04-28 | 2015-11-25 | 宇龙计算机通信科技(深圳)有限公司 | Selective screen projection method and device thereof |
US20180121663A1 (en) * | 2016-11-01 | 2018-05-03 | Microsoft Technology Licensing, Llc | Sharing Protection for a Screen Sharing Experience |
CN106603667A (en) * | 2016-12-16 | 2017-04-26 | 北京小米移动软件有限公司 | Screen information sharing method and device |
CN107333118A (en) * | 2017-07-17 | 2017-11-07 | 上海青橙实业有限公司 | The control method and device of project content |
CN107580105A (en) * | 2017-07-26 | 2018-01-12 | 努比亚技术有限公司 | A kind of screen sharing method, terminal and computer-readable recording medium |
CN108038396A (en) * | 2017-12-05 | 2018-05-15 | 广东欧珀移动通信有限公司 | Screen recording method and device and terminal |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11450069B2 (en) | 2018-11-09 | 2022-09-20 | Citrix Systems, Inc. | Systems and methods for a SaaS lens to view obfuscated content |
US11201889B2 (en) | 2019-03-29 | 2021-12-14 | Citrix Systems, Inc. | Security device selection based on secure content detection |
WO2020248955A1 (en) * | 2019-06-10 | 2020-12-17 | 华为技术有限公司 | Content sharing method and electronic device |
CN110989950A (en) * | 2019-11-15 | 2020-04-10 | 维沃移动通信有限公司 | Sharing control method and electronic equipment |
CN111198954B (en) * | 2019-11-28 | 2023-08-22 | 深圳市跨越新科技有限公司 | Method and system for analyzing ordering address structuring |
CN111198954A (en) * | 2019-11-28 | 2020-05-26 | 深圳市跨越新科技有限公司 | Method and system for structured analysis of order placement address |
CN110865654A (en) * | 2019-12-06 | 2020-03-06 | 河南送变电建设有限公司 | Power grid unmanned aerial vehicle inspection defect processing method |
CN111177694A (en) * | 2019-12-16 | 2020-05-19 | 华为技术有限公司 | Method and device for processing data |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
CN111143880B (en) * | 2019-12-27 | 2022-06-07 | 中电长城网际系统应用有限公司 | Data processing method and device, electronic equipment and readable medium |
CN111143880A (en) * | 2019-12-27 | 2020-05-12 | 中电长城网际系统应用有限公司 | Data processing method and device, electronic equipment and readable medium |
CN111131882A (en) * | 2019-12-30 | 2020-05-08 | 联想(北京)有限公司 | Screen recording method and device and electronic equipment |
CN111338721A (en) * | 2020-01-20 | 2020-06-26 | 北京大米未来科技有限公司 | Online interaction method, system, electronic device and storage medium |
CN111290722A (en) * | 2020-01-20 | 2020-06-16 | 北京大米未来科技有限公司 | Screen sharing method, device and system, electronic equipment and storage medium |
CN111290721A (en) * | 2020-01-20 | 2020-06-16 | 北京大米未来科技有限公司 | Online interaction control method, system, electronic device and storage medium |
CN111309938A (en) * | 2020-01-22 | 2020-06-19 | 恒大新能源汽车科技(广东)有限公司 | Multimedia file processing method and device |
US11582266B2 (en) | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
US11361113B2 (en) | 2020-03-26 | 2022-06-14 | Citrix Systems, Inc. | System for prevention of image capture of sensitive information and related techniques |
CN111488190B (en) * | 2020-03-31 | 2021-10-15 | 腾讯科技(深圳)有限公司 | Screen sharing method and device, computer equipment and storage medium |
CN111488190A (en) * | 2020-03-31 | 2020-08-04 | 腾讯科技(深圳)有限公司 | Screen sharing method and device, computer equipment and storage medium |
US11165755B1 (en) | 2020-08-27 | 2021-11-02 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
WO2022041058A1 (en) * | 2020-08-27 | 2022-03-03 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
US11977932B2 (en) | 2020-08-27 | 2024-05-07 | Honor Device Co., Ltd. | Information sharing method and apparatus, terminal device, and storage medium |
US11082374B1 (en) | 2020-08-29 | 2021-08-03 | Citrix Systems, Inc. | Identity leak prevention |
US11627102B2 (en) | 2020-08-29 | 2023-04-11 | Citrix Systems, Inc. | Identity leak prevention |
CN112511601B (en) * | 2020-11-16 | 2021-12-07 | 北京仁光科技有限公司 | Multi-screen data interaction system and multi-screen data interaction method |
CN112511601A (en) * | 2020-11-16 | 2021-03-16 | 北京仁光科技有限公司 | Multi-screen data interaction system and multi-screen data interaction method |
CN114860178A (en) * | 2021-01-18 | 2022-08-05 | 华为技术有限公司 | Screen projection method and electronic device |
CN113050900B (en) * | 2021-03-17 | 2024-01-23 | 平安普惠企业管理有限公司 | Screen sharing method, device, equipment and storage medium |
CN113050900A (en) * | 2021-03-17 | 2021-06-29 | 平安普惠企业管理有限公司 | Screen sharing method, device, equipment and storage medium |
CN113222809A (en) * | 2021-05-21 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Picture processing method and device for realizing privacy protection |
CN113778360A (en) * | 2021-08-20 | 2021-12-10 | 荣耀终端有限公司 | Screen projection method and electronic equipment |
CN113778360B (en) * | 2021-08-20 | 2022-07-22 | 荣耀终端有限公司 | Screen projection method and electronic equipment |
CN113704824A (en) * | 2021-08-31 | 2021-11-26 | 平安普惠企业管理有限公司 | Synchronous generation method, device and equipment of page guide mark and storage medium |
CN113791713A (en) * | 2021-09-01 | 2021-12-14 | 远峰科技股份有限公司 | Vehicle multi-screen display window sharing method and device |
CN114553844B (en) * | 2022-03-09 | 2022-09-06 | 润芯微科技(江苏)有限公司 | Method for sharing screen during video |
CN114553844A (en) * | 2022-03-09 | 2022-05-27 | 润芯微科技(江苏)有限公司 | Method for sharing screen during video |
CN114827519A (en) * | 2022-04-08 | 2022-07-29 | 咪咕文化科技有限公司 | Processing method and device for sharing content, sharing terminal and storage medium |
WO2024045764A1 (en) * | 2022-08-31 | 2024-03-07 | 中兴通讯股份有限公司 | Display method and apparatus, terminal, electronic device and storage medium |
WO2024051634A1 (en) * | 2022-09-06 | 2024-03-14 | 华为技术有限公司 | Screen projection display method and system, and electronic device |
CN117714759A (en) * | 2022-09-06 | 2024-03-15 | 华为技术有限公司 | A method, system and electronic device for screen projection |
WO2024109509A1 (en) * | 2022-11-25 | 2024-05-30 | 华为技术有限公司 | Content acquisition method, readable storage medium, program product and electronic device |
Also Published As
Publication number | Publication date |
---|---|
WO2020248955A1 (en) | 2020-12-17 |
CN110378145B (en) | 2022-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110378145A (en) | A kind of method and electronic equipment of sharing contents | |
WO2018095279A1 (en) | Method and apparatus for security question generation and identity verification | |
CN111767554B (en) | Screen sharing method and device, storage medium and electronic equipment | |
KR102206060B1 (en) | Effect display method of electronic apparatus and electronic appparatus thereof | |
CN107924288A (en) | Electronic equipment and its method for carrying out perform function using speech recognition | |
CN104158722B (en) | For light information push method, device, terminal and the server applied | |
CN106462713B (en) | The interface display method and terminal of terminal | |
WO2021018169A1 (en) | Privacy protection method for electronic device, and electronic device | |
WO2016165557A1 (en) | Method and device for realizing verification code | |
CN108289244A (en) | Video caption processing method, mobile terminal and computer readable storage medium | |
WO2015055095A1 (en) | Identity authentication method and device and storage medium | |
US20130147705A1 (en) | Display apparatus and control method thereof | |
CN112287234B (en) | Information retrieval method, device and storage medium | |
CN107810472A (en) | Electronic installation and the method for the display for controlling panoramic picture | |
CN104967637B (en) | operation processing method, device and terminal | |
CN107590770A (en) | Image obscures encryption method, mobile terminal and storage medium | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN108171034A (en) | A kind of method and terminal for protecting privacy | |
JP2022552862A (en) | Display method and electronic equipment | |
CN115426521A (en) | Method, electronic device, medium, and program product for screen capture | |
US10185760B2 (en) | Method and device for forming group using communication history information | |
CN116257159A (en) | Multimedia content sharing method, device, equipment, medium and program product | |
CN111597592B (en) | Input method, input device and mobile terminal | |
CN108845732A (en) | A kind of information display method and terminal device | |
US20150032816A1 (en) | Information processing apparatus, information processing method, and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |